A new Windows Search zero-day is giving Microsoft another security headache

Fingertip pressing keyboard key with Windows logo on it
Är du ute efter bästa VPN för Windows 10 och Windwos 11? Här är våra favoriter just nu. (Image credit: Shutterstock)

When used in synergy, two recently discovered Windows flaws allow threat actors to run malware on a target endpoint, researchers have found.

The two flaws are a Windows Search zero-day, and a Microsoft Office OLEObject flaw.

Through the use of a weaponized Word document, the Search zero-day can be used to automatically open a search window with a remotely hosted malware. This was made possible due to how Windows handles a URI protocol handler called “search-ms”.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

OLEObject flaw

This protocol allows apps and HTML links to launch customized searches. The problem is that Windows will warn the victim that the site is trying to open Windows Explorer, possibly alerting most of them that something’s amiss. 

However, Hacker House co-founder and security researcher Matthew Hickey discovered that by pairing this flaw with the Microsoft Office OLEObject flaw, a search window can be opened simply by opening a Word document. 

Long story short, a crook can land a weaponized Word document via a phishing email, and once the victim opens it, a custom Windows Search page can pop up, containing malware hosted remotely.

The share can carry any name the attacker wants, BleepingComputer has warned, including things like “Critical Updates”.

Luckily enough, there’s a way to mitigate the threat, by deleting the search-ms protocol handler from the Windows Registry. To do that, run CMD as Administrator, and then run this command: "reg delete HKEY_CLASSES_ROOT\search-ms /f".

Abusing URI protocol handlers seems to be high fashion these days, as earlier this week, researchers found cybercrooks abusing such a flaw found in the Microsoft Windows Support Diagnostic Tool (MSDT). With the help of a weaponized Word document, the “ms-msdt” URI protocol handler can be launched which, in turn, can execute any PowerShell commands. 

The flaw, dubbed “Follina”, was found being used by Chinese state-sponsored attackers, against the international Tibetan community. 

Via: BleepingComputer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Avast cybersecurity
An unpatched Windows zero-day flaw has been exploited by 11 nation-state attackers
Outlook
Dangerous Microsoft Outlook flaw could let hackers send out malware via email
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Representational image depecting cybersecurity protection
Hackers are breaking SonicWall products to target business networks
Representational image of a cybercriminal
Microsoft discovers five potentially damaging attacks against its own software
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
Wonka poster
Netflix cooks up sweet new reality TV series based on Charlie and the Chocolate Factory, and it's a dream come true for me
Citroen 2CV
The retro EV resurgence is in full swing, as Citroen confirms the iconic 2CV will return with batteries
Hugging Snap
This AI app claims it can see what I'm looking at – which it mostly can
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs
Hornet swings their weapon in mid air
Hollow Knight: Silksong could potentially launch this year and I reckon it could be a great game for an Xbox handheld
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average